Sciweavers

9405 search results - page 1819 / 1881
» Computing a Model of Set Theory
Sort
View
IUI
2009
ACM
16 years 8 days ago
Learning to generalize for complex selection tasks
Selection tasks are common in modern computer interfaces: we are often required to select a set of files, emails, data entries, and the like. File and data browsers have sorting a...
Alan Ritter, Sumit Basu
169
Voted
ISPASS
2009
IEEE
15 years 10 months ago
Analyzing CUDA workloads using a detailed GPU simulator
Modern Graphic Processing Units (GPUs) provide sufficiently flexible programming models that understanding their performance can provide insight in designing tomorrow’s manyco...
Ali Bakhoda, George L. Yuan, Wilson W. L. Fung, He...
114
Voted
ATAL
2009
Springer
15 years 10 months ago
Real-time expressive gaze animation for virtual humans
Gaze is an extremely important aspect of human face to face interaction. Over the course of an interaction, a single individual’s gaze can perform many different functions, such...
Marcus Thiébaux, Brent Lance, Stacy Marsell...
140
Voted
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
ISCA
2007
IEEE
130views Hardware» more  ISCA 2007»
15 years 9 months ago
Dynamic prediction of architectural vulnerability from microarchitectural state
Transient faults due to particle strikes are a key challenge in microprocessor design. Driven by exponentially increasing transistor counts, per-chip faults are a growing burden. ...
Kristen R. Walcott, Greg Humphreys, Sudhanva Gurum...
« Prev « First page 1819 / 1881 Last » Next »